Inactive ransomware operator
← All groupsHelldown
37 victims indexed · first seen 2 years ago · last activity 2 years ago
At a glance
- Status
- inactive
- First seen
- 2 years ago
- Last activity
- 2 years ago
- Onion sites
- 3 known endpoints
- Primary sector
- Not Found · 14 hits
About
References
5 linksExternal sources curated by the MISP threat-intel community.
- ransomlook.io/group/helldown
- truesec.com/hub/blog/helldown-ransomware-group
- blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat
- hivepro.com/threat-advisory/new-helldown-ransomware-a-growing-threat-across-cross-platform-systems
- broadcom.com/support/security-center/protection-bulletin/helldown-ransomware
Timeline
2 monthsTop countries
Top sectors
MITRE ATT&CK
5 techniques · 4 tacticsTactics
Recent victims
Loading…
Onion infrastructure
3 known- http://onyxcgfg4pjevvp5h34zvhaj45kbft3dg5r33j5vu3nyp7xic3vrzvad.onion
- http://onyxcym4mjilrsptk5uo2dhesbwntuban55mvww2olk5ygqafhu3i3yd.onion
- http://onyxcym4mjilrsptk5uo2dhesbwntuban55mvww2olk5ygqafhu3i3yd.onion/
Source
Updated 2 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
